Preview

Computer Specialist Career

Good Essays
Open Document
Open Document
525 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Computer Specialist Career
Running Head: COMPUTER MANAGEMENT SECURITY

Computer Management Security
Jason Jones
Computer Applications CGS2167-XX
29 April 2010

Abstract
A computer security career is a highly diverse and important position, where you could work anywhere from a College Campus to a Hospital Administration building, all the way up to the Government Agencies all over the world. With so many new businesses’ opening daily, worldwide, the job market will be forever expanding. Whenever a business’s computer system acts up it’s the job of their computer security specialist to carefully take all the required steps to identify and resolve the specific issue, combining many people into one, saving the company lots of money. These specialists have and exceptional and advanced overall knowledge of all things computer.

Computer Security Manager
Computer security is made up of digital forensic, network security, and preventing malware, and is a rapidly growing field that involves gathering and analyzing evidence from computers and networks. Because computers and the internet are the fastest growing technology used for criminal activity, the need for computer security managers will increase in years to come.
A computer security manager examines computer media, programs, data, and log files on computers, servers, and networks. There are many business that employ computer security managers, including colleges, hospitals, law enforcement, the military, and many others organizations of the government and private sector.
A computer security manager must have knowledge of the latest computer and network policies, patches, and have good technical experience with many types of hardware and software products, superior communication skills, and willingness to learn and update skills, and a knack for problem solving skills.
When a problem occurs, it is the responsibility of the computer security manager to carefully take the required steps to identify and resolve the security issues.



Cited: Reinman, D. P. (2008, February). Fighting Cybercriminal. Cybertech Monthly , pp. 52-58. Shelly, G. B. (2008, March 7). Computer Careers. Retrieved from scsite.com: http://www.scsite.com/wd2007/pr2/wc.html Turrel, M. O. (2008). Cybercrimes and Criminals. El Paso: Legal Works Publishing Company.

You May Also Find These Documents Helpful

  • Powerful Essays

    IS3110 U5L1

    • 912 Words
    • 4 Pages

    One of the most important first steps to risk management and implementing a security strategy is to identify all resources and hosts within the IT infrastructure. Once you identify the workstations and servers, you now must then find the threats and vulnerabilities found on these workstations and servers. Servers that support mission critical applications require security operations and management procedures to ensure C-I-A throughout. Servers that house customer privacy data or intellectual property require additional security controls to ensure the C-I-A of that data. This lab requires the students to identify threats and vulnerabilities found within the Workstation, LAN, and Systems/Applications Domains.…

    • 912 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    This course covers much material about information security in a few short weeks. Whereas the subject is much deeper than what is covered in the course material, you should obtain a useful overview of how important effective information security is, and some ways it can be effectively…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    The information in this paper will investigate the elements involved in computer security. Protecting information today requires more than just locking a door or filing cabinet. With data being stored electronically, it is vital that important information be protected from prying eyes. There are many different methods for protecting information that is stored on computers. These methods include everything from password and usernames to biometric devices. There are also software solutions that are used, including antivirus and anti-malware software along with firewalls. All of this is to accomplish the desired…

    • 1544 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    In the IT sector especially, employers seek future employees with a wide knowledge of security systems and basic knowledge of how to keep safe on the internet. This says that you would know what you are doing while using the internet and can handle the maintenance needed to keep a computer safe and up to date while using a variety of software. In addition this will mean that you are very aware of issues and threats which can make you a…

    • 858 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    However, perhaps the most important skill to a system administrator is problem solving frequently under various sorts of constraints and stress. The sysadmin is on call when a computer system goes down or malfunctions, and must be able to quickly and correctly diagnose what is wrong and how best to fix it.…

    • 599 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Air Wright case study

    • 1396 Words
    • 5 Pages

    Today if we are talking about computer security there are different terminologies that contribute in making the outline of computer security. It is the combination of different processes and mechanism by which important and sensitive information are secluded from publication and tampering by unauthorized persons. The major focus of computer security is to protect information and critical data from unauthorized usage. Computer security has deep roots in Information technology industry. Security in IT can be defined as a branch of computer science which is related to control of different kinds of risks associated with critical data. This can be done only if the authorized person dealing with the system network or administration secures this information with good software and servers which are designed to work heavily.…

    • 1396 Words
    • 5 Pages
    Better Essays
  • Best Essays

    CB Hart has suffered major reputation problems because of disregarding the small security issues. Company has been affected by the event of data leakage. The information that leaked was not hugely confidential but that situation was damaging enough to cause a big decrease in the reputation of the CB Hart.…

    • 3482 Words
    • 14 Pages
    Best Essays
  • Powerful Essays

    Security Self Assessment

    • 1535 Words
    • 7 Pages

    This report is a derivative of security self-assessment based on the National Institute of Standards and Technology (NIST) special publication 800-26 (SP 800-26) (Swanson). The organization being assessed is an electronics and computer manufacturer’s technical support division technical and physical controls to support the information technology security. We will refer to this organization as Tech Inc., which is a fictitious name for this company.…

    • 1535 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    While both of the above elements of the question complement each other, without understanding the main purpose of security management, which is in itself is multifaceted in nature, and ideally to be successful should be employed throughout all aspects of a business, as can be seen…

    • 1598 Words
    • 7 Pages
    Powerful Essays
  • Better Essays

    Digital security….the term is almost a paradox in that there is no such thing as security when it comes to secure computing. At best, threats to digital security can be lessened and sometimes prevented but there is no such thing as an impenetrable defense. Corporations are constantly plagued by computer viruses and hacker attacks are on the rise leaving corporate networks vulnerable. It is estimated that 90% of all businesses every year are affected by security breaches to the tune of some $17 billion. Beyond the enormous costs that can easily wipe out a company’s IT budget, there are far-reaching business repercussions. Day-to-day business operations can be disrupted, customers alienated and a Company’s once good reputation tarnished. With the emerging security threats from a Company’s insiders to the sophisticated cyber terrorist, security breaches are clearly on the rise.…

    • 1133 Words
    • 5 Pages
    Better Essays
  • Good Essays

    A Computer Security Specialist implements, plans and coordinates security measures for information systems. Computer Security Specialists create plans to guard computer files against cyber attacks, unauthorized modification, accidental, destruction and disclosure. Employees talk with users to mediate security violations, programming changes, and issues arising from computer data access needs. Computer Security Specialists erect firewalls and encrypt data transmissions to conceal confidential information. The educational requirements for becoming a computer security specialist vary. Some jobs may require only a computer-related associate degree. However, a bachelor’s degree in information Systems or Computer Science is a prerequisite for some jobs. The employment outlook from now until 2020 is projected to grow 22 percent. Demand for information security analysts is expected to become very high as cyber attacks have become more sophisticated and frequent. Industries such as the healthcare and financial sector are expected to hire more computer security specialists, as they need to protect their clients’ information. Also, the use of cloud services requires service firms to take measures to ensure their data is safeguarded so customers can access storage, software and other computer services of the internet securely. The federal government is also expected to hire more computer security specialists, as they will need to protect the nation’s critical IT systems. The wage data from the Bureau of Labor Statistics indicates that the starting wage is $20 per hour, leading into the average wage of $34 per hour. The average 50 percent of computer security specialists earn about $46,000 to $73,600 annually. Working in a certain industry affects your level of pay. For example, a computer security specialist hired by a wired telecommunication carrier makes an average of $65,100 annually, while working for a university earns $51,400…

    • 499 Words
    • 2 Pages
    Good Essays
  • Better Essays

    At the beginning of my computer information course I was presented with challenge of writing a research paper. We were given several topics to choose from and I chose the topic of careers in information technology. The focus will be on the computer support specialist, the database administrator, the network and computer systems administrator, the computer, office machine and automated teller technician, the programmer, the software engineer, the cryptographer, the computer trainer, and the desktop publisher. I will explore what each profession is, the duties, the work environment, the education required to be in each profession, the earning potential and the future employment outlook of each field.…

    • 2317 Words
    • 10 Pages
    Better Essays
  • Powerful Essays

    Information

    • 6019 Words
    • 25 Pages

    References: [CHR90]Interview with Agent Jim Christy, Chief, Air Force Office of Special Investigations, Computer Crime Division, 26 March 1990. [DOD85]Department of Defense Trusted Computer System Evaluation Criteria, DoD 5200.28-STD, Department of Defense, Washington, DC, December 1985. [DOJ88]Basic Considerations in Investigating and Proving Computer-Related Federal Crimes, U.S. Department of Justice, Justice Management Division, Washington, DC, November 1988. [HIG89]Higgins, John C., Information Security as a Topic in Undergraduate Education of Computer Scientists, Proceedings of the 12th National Computer Security Conference, November 1989. [MAC89]Maconachy, W.V., Computer Security Education, Training, and Awareness: Turning a Philosophical Orientation into Practical Reality, Proceedings of the 12th National Computer Security Conference, November 1989. [OTA87]U.S. Congress, Office of Technology Assessment, Defending Secrets, Sharing Data: New Locks and Keys for Electronic Information, OTA-CIT-310, Washington, DC, U.S. Government Printing Office, October 1987. [PFL89]Pfleeger, Charles P., Security in Computing, PrenticeHall, 1989.…

    • 6019 Words
    • 25 Pages
    Powerful Essays
  • Good Essays

    I have been interested in the It career for about two years now. One of my family members is working in the network and computer systems administration field and he has been encouraging me to continue my education in this field. He describes his daily schedule and it has made me become interested in the field. He has been showing some of the work he and I have been enjoying the hands on practice. I started troubleshooting and diagnosing on my computer and immediate family members with my cousins help and realized that I really enjoyed doing this kind of work. His encouragement…

    • 801 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Systems Arch

    • 4112 Words
    • 17 Pages

    5. A(n) computer operations manager typically is responsible for a large computer center and all of the software executed therein.…

    • 4112 Words
    • 17 Pages
    Powerful Essays